494
494
Dec 31, 2006
12/06
by
Recon Conference
movies
eye 494
favorite 0
comment 0
This presentation talks about the fact and fiction of today's security devices. It explains how to approach testing the validly of their claims and provides multiple examples of real world products and their weaknesses. Rarely do security engineers look at network products from the creation point of view. Understanding how and why they are created and the limitations of that process can lead to finding security issues quite a bit quicker and easier. Bio Dennis Cox is the Chief Technical Officer...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security
2,100
2.1K
Nov 17, 2006
11/06
by
Recon 2006
movies
eye 2,100
favorite 0
comment 0
Skype is a free (as in beer) voice over IP application. Many other VOIP applications exist, but some specific points make Skype very different, such as its peer-to-peer architecture, its ease to bypass firewalls and, last but not least, the impressive level of obfuscation that has been invested to prevent anybody from looking inside the software and its communications. This last point added to its increasing success gave birth to many myths on security issues around it. This presentation will...
Topics: Recon, Skype, Reverse Engineering, Conference, Montreal, Security
3,478
3.5K
Nov 17, 2006
11/06
by
Recon 2006
movies
eye 3,478
favorite 1
comment 0
Reversers, and more specifically web-seekers, are a strange bunch of 'matter of fact' fellows: their most peculiar endowment is the capacity of reversing realities around them... red As a consequence -among many others- they don't buy any advertisement hype (in fact they don't buy advertisements in general), and they don't trust any commercial enterprise, knowing very well that people bent on making money out of the web have no intention whatsoever of spreading knowledge without having seen...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Searching, Google, Searchlores, Fravia
696
696
Dec 31, 2006
12/06
by
Recon Conference
movies
eye 696
favorite 0
comment 0
IDAPython has made a big splash, by embedding the python interpreter as an IDA plugin, and wrapping the IDA SDK for access from python code. I think this was a great idea to allow more rapid development of IDA plugins, and to help write advanced plugins easier. However, I found a few draw backs with IDAPython. Besides preferring a language besides python, I think the plugin architecture could be improved upon, and brought to be network based. I also think that building some higher level classes...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Ruby, IDA
516
516
Nov 17, 2006
11/06
by
Recon 2006
movies
eye 516
favorite 0
comment 0
Static source code analysis has evolved rapidly in the past few years into a powerful developmental aid. However, many developers' perceptions of static analysis are incorrect. Analysis techniques are more advanced than many people realize, but also not the magic bullet many hope for. Successful utilization and integration of static analysis requires understanding its possibilities and limits. This talk is primarily targeted at security concious software developers and consultants. It's...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Static Analysis
1,226
1.2K
Oct 29, 2006
10/06
by
Recon 2006
movies
eye 1,226
favorite 0
comment 0
Michael Sutton - Fuzzing - Brute Force Vulnerability Discovery This presentation will introduce fuzzing and discuss how it can be applied to different classes of vulnerabilities. We will begin by looking at fuzzing from an academic perspective. Most importantly, newly developed open source tools will be demonstrated and released publicly. Two primary audiences will be attracted to this presentation; those wishing to discover vulnerabilities through fuzzing and those who wish to protect against...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Fuzzing, Fuzz, Vulnerability
630
630
Dec 31, 2006
12/06
by
Recon
movies
eye 630
favorite 0
comment 0
Windows 2003 Service Pack 1 introduces new features into the kernel which protect against previous methods of accessing kernel memory from user mode without the usage of a driver. For example, both the usage of the DevicePhysicalMemory section as well as of the ZwSystemDebugControl APIs has now been completely blocked, meaning that editing kernel memory through physical addresses, installing a callgate or using IDT modifications are not possible methods of violating the ring privilege level....
Topics: Recon, Reverse Engineering, Conference, Montreal, Security
43
43
movies
eye 43
favorite 1
comment 0
Publicado el 3 mar. 2015 United States Marine Force Recon. The Force Reconnaissance companies (FORECON), also known as Force Recon, (0358) are one of the United States Marine Corps's special operations capable forces (SOC) that provide essential elements of military intelligence to the command element of the Marine Air-Ground Task Force (MAGTF); supporting their task force commanders, and their subordinate operating units of the Fleet Marine Force (FMF). Historically, the Force Recon companies,...
Topic: A
545
545
Dec 31, 2006
12/06
by
Recon
movies
eye 545
favorite 1
comment 0
This talk will go over advancements in the technology to circumvent measures put into place to prevent the age old internet pastime of annoying other people. Methods and tools will be presented for breaking audio and visual CAPTCHA systems, taking advantage of lazy registrant authentication, ruining the quality of collaborative content, and defeating spam filters even better than the spammers do and otherwise compromising usability, as well as a few other surprise demos. Bio Christopher Abad is...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Whales
176
176
movies
eye 176
favorite 0
comment 0
Advanced Network Recon With Nmap
642
642
Dec 31, 2006
12/06
by
Recon
movies
eye 642
favorite 0
comment 0
The DMCA has been trying to stop the exchange/sharing of information. Specifically, they have tried to stop discussions regarding reverse code engineering and file sharing. Since reverse engineering is a critical part of software development, I will try to explain why the DMCA rules are faulty in regards to reverse code engineering and search engines that provide links to infringing material. Bio Protector of RCE information
Topics: Recon, Reverse Engineering, Conference, Montreal, Security
600
600
Dec 31, 2006
12/06
by
Recon Conference
movies
eye 600
favorite 0
comment 0
In this presentation, we will introduce the new Linux Trace Toolkit Next Generation (LTTng) kernel tracer and its analysis counterpart, Linux Trace Toolkit Viewer (LTTV), a fully extensible text and graphical trace viewer. We will focus on how these tools can be used in the security field, particularly for reverse engineering. It can be very useful to reverse engineer a software "black box". It can be a driver, a library or a multithreaded application : the tracer can log every...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, LTT, Kernel, Tracing
52
52
Jun 26, 2012
06/12
by
pcmag
movies
eye 52
favorite 0
comment 0
This is episode 046 of dl.tv. Here is the episode page description: Streamed live 4PM Thursday, March 24th! Here some of the deets from tonight's show: Microsoft: Vista to Launch in January 2007 Microsoft Confirms 'Highly Critical' IE Hole Security Watch: Adobe, Apple, Microsoft All Issue Fixes Samsung Execs Plead Guilt in US DRAM Probe VOiP and 911: Less than perfect? The physics rule, the AI doesn't, and Ghost Recon Advanced Warfighter on the Xbox 360 begs for an HDTV Dan Hsu tells us how...
Topics: DL.TV, pcmag, dltv, dl.tv, Patrick Norton, Robert Heron, Dan Hsu
Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things that can be done with Google. All new for BH USA 2005, Johnny reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques. Check out Google's search-blocking tactics (and see them...
32
32
Aug 10, 2013
08/13
by
G4TV.com
movies
eye 32
favorite 0
comment 0
Watch and learn the best place to snipe from for the multiplayer maps Treasury and Nowhere.
Topics: G4TV.com videos, G4TV.com unpublic video ids
139
139
movies
eye 139
favorite 0
comment 0
Video review del último título del archiconocido Tom Clancy: Ghost Recon Advanced Warfighter.
1,080
1.1K
Nov 27, 2006
11/06
by
Recon Conference
movies
eye 1,080
favorite 1
comment 0
Breaking WPA-PSK is possible with coWPAtty, but trying to do so onsite can be time consuming and boring. All that waiting around for things to be computed each and every time we want to check for dumb and default passwords. Well, we're impatient and like to know the password NOW! Josh Wright has recently added support for precomputed tables to coWPAtty -- but how do you create a good set of tables and not have it take 70 billion years? h1kari has implemented the time consuming PBKDF2 step of...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Wifi, Wireless, FPGA, WPA, WEP
511
511
Dec 31, 2006
12/06
by
Recon Conference
movies
eye 511
favorite 0
comment 0
Don't wait for your vendor to get around to it, fix bugs yourself! There is no need to wait for patches and new (possibly expensive) software upgrades. In many cases fixing bugs in binaries is easier and faster than in the source code. This is especially true considering the complexity of library dependencies and build environments. Some consider "cracking" software protection a form of patching bugs, that is not what this talk is about. It covers straightforward reverse engineering...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Bugs
34
34
Aug 10, 2013
08/13
by
G4TV.com
movies
eye 34
favorite 0
comment 0
The Ghosts are called upon once again to save the United States from insurgent rebel forces.
Topics: G4TV.com videos, G4TV.com unpublic video ids
520
520
Nov 17, 2006
11/06
by
Recon 2006
movies
eye 520
favorite 0
comment 0
This presentation will be about a virus/worm framework which takes advantage of the abundance of NOP-areas produced by modern compilers in executables. The virus is bound to the x86 CPU architecture (with the possibility of porting it to other CISC architectures); however, a key feature of this infection vector is that the virus is operaing system independent. The majority of my work so far has been done on GNU/Linux but tests have been run on Windows XP, NetBSD and FreeBSD. Future targets...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Virus
436
436
Apr 6, 2011
04/11
by
Recon
movies
eye 436
favorite 0
comment 0
The latest advances in exploitation of memory corruption vulnerabilities revolve around applying return-oriented exploitation techniques to evade non-executable memory protections such as Microsoft's Data Execution Prevention (DEP), CPU-supported non-executable memory (NX/XD), and mandatory code-signing such as on iPhone OS. Although the ideas behind these exploitation techniques can be traced quite far back, they are receiving more attention as non-executable memory protections become more...
Topics: recon_2010_dino_dai_zovi, Recon 2010, Mac OS X, exploitation, return-oriented exploitation
727
727
Jun 27, 2012
06/12
by
PhreakNIC
movies
eye 727
favorite 0
comment 0
Compromising Physical Locks by Sysmin, Riskable and Qui Gon This presentation covers the art of lock picking and lock bypassing. It will provide an overview of various types of locks along with the tools and methods used to compromise them. There will also be discussions as to what features make for a high security lock and what makes a cheap lock so worthless. The presentation has been created with the beginner in mind so if you've never touched a lock pick in your life, feel free to join in...
Topics: phreaknic, hacker, conference
1,374
1.4K
Nov 17, 2006
11/06
by
Recon 2006
movies
eye 1,374
favorite 1
comment 0
Many security systems are beginning to rely on hardware-based techniques to raise the difficulty of attacking a system. As a result, a basic understanding of circuit boards and what they mean can often times be helpful. In this session, bunnie will introduce the topic of reading and understanding circuit boards. We will learn what the basic components look like, and how to determine their function in a circuit. We will then quickly ascend to taking a higher-level approach toward systems and...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Hardware
301
301
Mar 7, 2011
03/11
by
Recon
movies
eye 301
favorite 0
comment 0
Swizzor is a malware family that was first seen on the Internet in 2002 and, since then, researchers have collected millions of different binary samples. The reason so many different files exist is that Swizzor uses strong server-side binary obfuscation to evade antivirus detection and slow down manual reverse engineering. In this talk, we will present a set of tools and techniques we have developed to understand and defeat Swizzor's binary protection. Upon execution, the custom packer goes...
Topics: recon_2010_pierre-marc_bureau_and_joan_calvet, Recon 2010, Reverse Engineering, Swizzor, Obfuscation
517
517
Dec 31, 2006
12/06
by
Recon Conference
movies
eye 517
favorite 0
comment 0
The amount of new malware being developed has increased at a staggering rate over the last couple of years. At the same time, executable packing technology has grown to provide malware authors with a myriad of choices in how they pack their malware to evade detection and analysis. This presents a growing problem to analysts who lack the time to learn how each packer works and can be unpacked, but still need to be able to quickly handle anything that comes their way. There are three conventional...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Unpacking
26
26
Aug 11, 2013
08/13
by
G4TV.com
movies
eye 26
favorite 0
comment 0
Take the chopper, fly in, recon and fly safe. Can you be a real hombre?
Topics: G4TV.com videos, G4TV.com unpublic video ids
5,537
5.5K
Jun 28, 2012
06/12
by
ShmooCon
movies
eye 5,537
favorite 2
comment 0
ShmooCon 2009 2009 Presentations Keynote: Matt Blaze Since 2004, Matt Blaze has been a computer science professor at the University of Pennsylvania; prior to that, he spent a dozen years on the research staff of AT&T (Bell) Labs. Matt's work focuses on cryptography and its applications, trust management, physical and human scale security, designing secure systems, and networking and distributed computing. He's particularly interested in security related to public policy, such as...
Topics: shmoocon, hacker, conference
1,213
1.2K
Oct 30, 2006
10/06
by
Recon 2006
movies
eye 1,213
favorite 1
comment 0
There are a slew of languages, tools, interfaces and file formats for various reverse engineering tasks. Making tools play nice together and deciding how to develop new tools is a cumbersome process. The goal of the framework is to reduce the time from "idea" to prototype to a matter of minutes, instead of days. PaiMei was created for personal use and after much debate it was decided to release the majority of the toolkit to the public. This presentation will introduce PaiMei, discuss...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Framework, Python, OpenRCE
This episode is dedicated to the state of Oregon. First I feature a contribution from a viewer on a quest for his family's 500th find at what some consider to be the Meca of Geocaching. The "Original Stash Plaque". The video follows the family on a two day trip and features great footage. Next is a promo video for a cache called the "Rest Stop Recon Cache" by Pablo Mac. Also, as a bonus, Pablo Mac also sent me a video on the birth of the sport. As usual, the video is...
Topics: Geocaching, gps, outdoors, fun
1,907
1.9K
Oct 29, 2006
10/06
by
Recon 2006
movies
eye 1,907
favorite 0
comment 0
One of the applications of reverse engineering in computer security is the analysis of operating systems and software for which no source code is available. Most commonly the target is Microsoft Windows, and the goal is to find new 0-day vulnerabilities or to understand the full impact of old bugs. Reverse engineering Microsoft software presents numerous challenges. Based on his experience with reversing all Microsoft patches from the last 6 months, the speaker will present a number of...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security
42
42
Aug 10, 2013
08/13
by
G4TV.com
movies
eye 42
favorite 0
comment 0
The terrorists are back. Prepare for the fight of your life.
Topics: G4TV.com videos, G4TV.com unpublic video ids
958
958
Dec 31, 2006
12/06
by
Recon Conference
movies
eye 958
favorite 0
comment 0
In recent years, people have become more familiar with the term "social engineering", the use of deception or impersonation to gain unauthorised access to resources from computer networks to buildings. Does this mean that there are fewer successful social engineering attacks? Probably not. In fact, because computer security is becoming more sophisticated and more difficult to break (although this is still very possible) more and more people are resorting to social engineering...
Topics: Recon, Reverse Engineering, Conference, Montreal, Security, Social Engineering
Our look at the follow-up to the popular Tom Clancy tactical shooter. Want in on the discussion? Visit the Project: Gametime forums at http://www.bagofmadbastards.com.